Question 76

Which of the following best describes the threat concept in which an organization works to ensure that all network users only open attachments from known sources?
  • Question 77

    A company is implementing a vulnerability management program and moving from an on-premises environment to a hybrid IaaS cloud environment. Which of the following implications should be considered on the new hybrid environment?
  • Question 78

    A vulnerability scan shows the following issues:
    Asset Type
    CVSS Score
    Exploit Vector
    Workstations
    6.5
    RDP vulnerability
    Storage Server
    9.0
    Unauthorized access due to server application vulnerability
    Firewall
    8.9
    Default password vulnerability
    Web Server
    10.0
    Zero-day vulnerability (vendor working on patch)
    Which of the following actions should the security analyst take first?
  • Question 79

    An analyst notices there is an internal device sending HTTPS traffic with additional characters in the header to a known-malicious IP in another country. Which of the following describes what the analyst has noticed?
  • Question 80

    A cybersecurity team lead is developing metrics to present in the weekly executive briefs.
    Executives are interested in knowing how long it takes to stop the spread of malware that enters the network. Which of the following metrics should the team lead include in the briefs?